No more typing reviews! Try our Samantha, our new voice AI agent.

Prisma Cloud by Palo Alto Networks vs Trellix Cloud Workload Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
124
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st), AI Observability (3rd)
Prisma Cloud by Palo Alto N...
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
114
Ranking in other categories
Web Application Firewall (WAF) (9th), Container Security (2nd), Cloud Security Posture Management (CSPM) (2nd), Cloud-Native Application Protection Platforms (CNAPP) (2nd), Data Security Posture Management (DSPM) (2nd)
Trellix Cloud Workload Secu...
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
4
Ranking in other categories
Cloud Workload Protection Platforms (CWPP) (28th)
 

Mindshare comparison

Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Prisma Cloud by Palo Alto Networks11.0%
Wiz13.8%
Microsoft Defender for Cloud8.1%
Other67.1%
Cloud-Native Application Protection Platforms (CNAPP)
Cloud Workload Protection Platforms (CWPP) Mindshare Distribution
ProductMindshare (%)
Trellix Cloud Workload Security0.6%
Microsoft Defender for Cloud14.0%
AWS GuardDuty11.3%
Other74.1%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Sreeraj Mohandas - PeerSpot reviewer
Security Engineer at HashXpert
Consolidated cloud security has reduced manual work and has automated vulnerability remediation
I elaborate on my rating of SentinelOne support by mentioning that there was some time where the troubleshooting took a longer time. In fact, there were many meetings going on. The availability of the document on the internet is on a lesser side because as an engineer, I would want to know about the troubleshooting aspects of this particular tool. When I am facing a customer, I do not prefer to bring the vendor to every call and try to resolve it, as it takes months and months. It would be better to have a training session with the engineer on site to explain and train properly. This is not the case with SentinelOne, so this is the only thing I have a complaint about. I do not have any other room for improvement to suggest within SentinelOne itself. However, I would really want the AI assistant for the threat hunting part to be more accessible. They have it, but they are making it licensed, so it is a bit on the higher end.
reviewer2776578 - PeerSpot reviewer
Cyber Security Architect at a comms service provider with 10,001+ employees
Image scanning has supported consistent security practices during cloud deployment
On a scale of ten, we would say people are happy with Prisma Cloud by Palo Alto Networks for the part we use. People are okay with it. We probably would give an eight. We don't give ten because if we don't use the other parts of Prisma Cloud by Palo Alto Networks, it's because it was difficult to implement from an operational point of view. We could have deployed the runtime monitoring with Prisma Cloud by Palo Alto Networks, but within our organization at our company, it was very difficult to find who would be the owner for the alerts. People have other tools and in the end, we don't use the full capabilities of a product that we pay for. It's partially related to the difficulty to integrate Prisma Cloud by Palo Alto Networks runtime in our company's support process. We don't use the real-time monitoring part of Prisma Cloud by Palo Alto Networks. We don't know about the automated remediation feature of Prisma Cloud by Palo Alto Networks.
Manish Kumar Twinkle - PeerSpot reviewer
Security Engineer at itsipl
Granular protection has improved cloud workload visibility and reduced breach and ransomware risk
Trellix Cloud Workload Security is important in our organization because it reduces our risk of data breaches, protects from ransomware, and addresses the misconfiguration of cloud resources such as AWS and Azure. If any lateral movement has occurred in our infrastructure, it provides me with an alert, along with notifications of any container misconfiguration. We also receive continuous visibility of servers and compliance assurance for our vulnerability protection, ensuring that if something is not patched or vulnerable, the vulnerabilities are fixed. The best feature of Trellix Cloud Workload Security is the granular level implementation and configuration of ransomware protection, which includes a threat prevention module and vulnerability protection, allowing us to protect our servers with the help of container security. When discussing the granular level implementation in Trellix Cloud Workload Security, it means that when we configure the policies for threat prevention, we can define many aspects such as the type of file, kernel level, boot level, execution read-write time, memory-specific, and application-specific parameters. We can configure it properly based on our knowledge and also define the schedule for anti-malware scanning and updates. Trellix Cloud Workload Security has positively impacted our organization by improving our visibility across cloud and infrastructure, showing how many workloads we have and what is occurring with those workloads. It enhances protection against threat monitoring through real-time alerts and addresses misconfiguration and vulnerabilities on workloads and running applications. Additionally, it ensures compliance with organizational and industry securities, facilitating faster incident detection and response, which helps our IT and security team proactively remediate risks before major incidents occur. When discussing faster incident detection and response with Trellix Cloud Workload Security, if any alert comes through, such as a vulnerability detected on a server, expanding the alert provides us with MITRE framework tactics and techniques, including necessary remediations for updates or modifications.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Singularity Cloud's ability to create custom correlation searches and reduce noise is highly valuable."
"The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"The management console is highly intuitive to comprehend and operate."
"SentinelOne Singularity Cloud Security has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"The biggest benefit of SentinelOne Singularity Cloud Security is that it has a good AI-based analytics engine that helps with the detection part by providing full visibility."
"SentinelOne Singularity Cloud Security is on top of protecting ephemeral workloads."
"The mean time to detect has been reduced."
"I would rate Prisma Cloud a ten out of ten."
"The solution offers very good configuration capabilities."
"Prisma Cloud's most valuable feature is its user identification capabilities."
"Prisma scans things and shows all the vulnerabilities and packages that are vulnerable, and which layers, by default, have vulnerabilities. So developers can easily go into the package or a particular layer and make changes to their code. It's very transparent."
"It also provides us with a single tool to manage our entire cloud architecture. In fact, we are using a multi-account strategy with our AWS organization. We use Prisma as a single source of truth to identify high- or medium-severity threats inside our organization."
"Technical support is quite helpful."
"Configuration monitoring and alerting is the most valuable feature; it happens at the cloud's speed, allowing our development team to respond quickly. If a configuration goes against our security best practices, we're alerted promptly and can act to resolve the issue. As cloud security staff, we're not staring at the cloud all the time, and we want to let the developers do their jobs so that our company is protected and work is proceeding within our security controls."
"If you can configure it well, Twistlock is a lot better in providing you real-time statistics than Aqua Security."
"All these things are beautifully done by McAfee Cloud Workload Security."
"The discovery feature is the most valuable. After you integrate your cloud environment, maybe an Azure or AWS, or a private environment hosted on VMware, it automatically starts discovering the number of servers that are running on that cloud and the number of services that you have done. It is a beautiful feature because, from a security standpoint, it is difficult to identify which VM is compliant or not when you keep on provisioning a number of VMs in the cloud. It also checks for compliance. It checks whether a system is compliant and whether antivirus is installed on a VM. If an antivirus is installed, it checks whether the antivirus is updated to the latest signature package or not. All these things are beautifully done by McAfee Cloud Workload Security. For communicating with the McAfee server, you need to install an agent on the VM. McAfee Cloud Workload Security gives you a direct opportunity to install an agent on a Windows machine. If you have a Windows cloud, you can directly push that agent onto the VM through your McAfee portal. It provides you a single dashboard view of all servers present in the cloud. It shows the servers on which the antivirus is already installed as well as the servers for which the antivirus installation is still pending. This dashboard view is a much-needed thing. It also has a centralized management, which makes it easy to use."
"The most valuable feature is the application control."
"Trellix Cloud Workload Security has positively impacted our organization by improving our visibility across cloud and infrastructure, showing how many workloads we have and what is occurring with those workloads."
"From my personal experience as a reseller, what really stands out in Trellix Cloud Workload Security is that it provides focused security with enhanced protection for servers in a cloud environment."
 

Cons

"The documentation that I use for the initial setup can be more detailed or written in a more user-friendly language to avoid troubles."
"The documentation could be better."
"They can work on policies based on different compliance standards."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"They could generally give us better comprehensive rules."
"While SentinelOne Singularity Cloud Security offers real-time response, there is room for improvement in alert accuracy."
"A vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"In terms of securing cloud-native development at build time, a lot of improvement is needed. Currently, it's more a runtime solution than a build-time solution. For runtime, I would rate it at seven out of 10, but for build-time there is a lot of work to be done."
"These tools have a set of signatures or rules that will alert you whenever something meets the criteria. In the future, they might include some machine learning or AI feature that allows you to ask questions about the context of the alert, and it will provide you answers based on the data that they have. Most vendors are doing it, and I believe they will do it in the future. The reporting bar could also use AI to add context based on the environment."
"Sometimes, on the Azure side, there are issues. Some errors aren't being found on Prisma Cloud."
"It does not provide runtime security or protection for Windows Server. It is currently lacking in terms of Windows environment."
"Support is an area that needs improvement."
"It provides all the cloud details but is not entirely linked to the compute model."
"The Fargate security microservice that's running doesn't support blocking features, which would be helpful. Another issue is the lifecycle. It isn't easy to upgrade if we have a console in Fargate."
"The data security model needs improvement due to integration issues with certain features and cloud providers. With Palo Alto now utilizing a tool from an Israeli startup in Prisma Cloud, the integration is slow, and some features are blocked or not supported."
"I still believe the support could improve because we face multiple challenges with Trellix support for solving issues, which take too long."
"There is room for improvement in the pricing model."
"Its vulnerability assessment is not the best. We cannot identify the vulnerabilities that are related to the operating system by using McAfee Cloud Workload Security. I wish McAfee would add a vulnerability assessment tool that will not only identify the vulnerability but will also be able to generate a report so that the required patching can be done for the servers. Currently, McAfee Cloud Workload Security only integrates with AWS and Azure. If it can also integrate with GCP, Alibaba, and other cloud services available in the market, it would be good because not all people are using Azure and AWS."
"We experience limited customer support, typically requiring a minimum wait of three to four hours for ticket responses."
"Its vulnerability assessment is not the best. We cannot identify the vulnerabilities that are related to the operating system by using McAfee Cloud Workload Security."
 

Pricing and Cost Advice

"PingSafe is fairly priced."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal."
"Pricing is based on modules, which was ideal for us."
"Its pricing was a little less than other providers."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"The tool is cost-effective."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"The price for Prisma Cloud is reasonable."
"Prisma Cloud is remarkably expensive."
"The Prisma Cloud pricing is good."
"Its licensing cost depends on the type of license such as the business license or the enterprise license. The enterprise license is costlier than the business license, but we get more visibility and more modules. If you have a multi-cloud environment and subscribe to each cloud's native CSPM tool, it is costly. If you are using a single tool like Prisma Cloud, with a single license, you can monitor all environments, such as Google Cloud, Azure, AWS, and Oracle Cloud. The cost of Prisma Cloud is less than the cost of subscribing to the CSPM tool of each cloud provider. This is where Prisma Cloud can save costs."
"The pricing of the solution is fair."
"You can expect a premium price because it is a premium quality product by a leading supplier."
"Prisma Cloud licensing works on credits."
"Prisma Cloud is more expensive than Check Point CloudGuard."
"It is not an expensive product. I am in the Indian market, and it is one of the most reliable and cost-effective solutions."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
894,998 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
9%
Government
5%
Financial Services Firm
15%
Computer Software Company
9%
Manufacturing Company
9%
Government
6%
Comms Service Provider
16%
Government
13%
Construction Company
10%
Outsourcing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business53
Midsize Enterprise24
Large Enterprise59
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise20
Large Enterprise57
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for PingSafe?
My experience with the pricing, setup costs, and licensing of SentinelOne Singularity Cloud Security is that the pric...
What needs improvement with PingSafe?
Integration could be improved because not all solutions can be integrated with SentinelOne Singularity Cloud Security...
What is your primary use case for PingSafe?
I use SentinelOne Singularity Cloud Security to collect endpoint data from the company, such as servers, computers, a...
What is your primary use case for Prisma Cloud by Palo Alto Networks?
Prisma Cloud helps support DevSecOps methodologies, making those responsibilities easier to manage.
What Cloud-Native Application Protection Platform do you recommend?
We like Prisma Cloud by Palo Alto Networks, since it offers us incredible visibility into our entire cloud system. We...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Prisma Public Cloud, RedLock Cloud 360, RedLock, Twistlock, Aporeto
McAfee Cloud Workload Security
 

Overview

 

Sample Customers

Information Not Available
Amgen, Genpact, Western Asset, Zipongo, Proofpoint, NerdWallet, Axfood, 21st Century Fox, Veeva Systems, Reinsurance Group of America
Information Not Available
Find out what your peers are saying about Prisma Cloud by Palo Alto Networks vs. Trellix Cloud Workload Security and other solutions. Updated: March 2025.
894,998 professionals have used our research since 2012.